Sustainable Computing: Informatics and Systems 23 (2019) 158–166 Contents lists available at ScienceDirect Sustainable Computing: Informatics and Systems jou rn al hom epage: www.elsevier.com/locate/suscom Reauthentication scheme for mobile wireless sensor networks Vandana Mohindru a, , Ravindara Bhatt b , Yashwant Singh c a Department of Computer Science and Engineering, Chandigarh Group of Colleges College of Engineering, Landran, Mohali, India b Department of Computer Science and Engineering, Jaypee University of Information Technology, Waknaghat, Solan, H.P., India c Department of Computer Science and Information Technology, Central University of Jammu, Jammu & Kashmir, India a r t i c l e i n f o Article history: Received 8 October 2018 Received in revised form 4 June 2019 Accepted 29 July 2019 Available online 13 August 2019 Keywords: Wireless Sensor Networks (WSNs) Mobile node Reauthentication Mobile Wireless Sensor Networks (MWSNs) Voronoi regions Mobile Healthcare Security a b s t r a c t Wireless sensor networks consist of static as well as mobile sensor nodes. Due to deployment of the sensor nodes, generally in an unattended and hostile environment, it becomes a critical issue as well as a cumbersome task to safeguard these nodes against various kinds of security attacks. The mobility of sensor nodes is a significant issue because these nodes continuously move from one region to another region and reconnect to other sensor nodes. Reauthentication and locating the node movement are the primary security issues in Mobile Wireless Sensor Networks (MWSNs). Many previous security algorithms available in the literature only consider the issues of static sensor nodes. In this paper, we propose an energy efficient mobile node authentication algorithm. For mobile node authentication, we design the reauthentication approach for mobile nodes and also design an authentication framework for securing MWSNs. The proposed protocol is compared with existing mobile node authentication protocols available in the literature. We observe that the proposed protocol provides low overhead while achieving the security requirements for mobile wireless sensor networks. © 2019 Elsevier Inc. All rights reserved. 1. Introduction Mobile Wireless Sensor Networks (MWSNs) consists of spatially distributed static sensor nodes [1,2] and a fraction of mobile sen- sor nodes in the Region-of-Interest (RoI). The applications of the MWSNs can be widely divided into time-driven, event-driven, on- demand and tracking based applications. The fraction of mobile nodes is advantageous over a complete static wireless sensor net- work in terms of several Quality-of-Service parameters such as energy efficiency, coverage, connectivity etc. [3]. Further, security [4] is an important issue in MWSN due to the dynamic nature of the mobile nodes [5,6]. Node mobility is the main concern in several application scenarios such as the Intelligent Transportation Sys- tem and healthcare scenario. In Mobile Healthcare (m-healthcare) applications nodes move from one region to another during the lifetime of a mobile node [7]. Therefore, the topology in a wireless sensor network based health scenario changes due to the mobility of nodes. This, in turn, leads to an increase in data management, topology management, and security issues in healthcare applica- tions [8]. Corresponding author. E-mail address: vandanamohindru@gmail.com (V. Mohindru). Therefore, our motivation is to present an energy-efficient, low overhead reauthentication scheme approach [9,10]. Reauthentica- tion of the mobile sensor nodes is required as these nodes are constrained to change their regions with the passage of time. In this paper, we present the Reauthentication approach for mobile nodes in the network. In this work, we design an authentication frame- work for securing MWSN [11]. The proposed protocol is compared with existing mobile node authentication protocols available in the literature [12,13]. We observe that the proposed protocol provides low overhead while achieving the security requirements for mobile wireless sensor networks. The contribution towards our work can be summarized as follows: Our reauthentication scheme is based on the schemes of Jiang et al. [14] and Kim et al. [15]. In order to reduce the communication overhead of the mobile nodes, our scheme is similar to Jiang et al. [14]. Our scheme is based on the hierarchical architecture in which we divide the regions into Voronoi regions [16]. The centre of the region in each of the Voronoi region is given by Voronoi Cluster Heads (VCH). The proposed scheme works for non-neighbour clus- ter heads (CH) and neighbours cluster heads. Compared to the work of Kim et al. [15] our scheme does not depend on the base station for routing of packets for non-neighbor cluster heads. The routing of packets for non-neighbor cluster heads is done on-demand basis by the VCH [16]. https://doi.org/10.1016/j.suscom.2019.07.010 2210-5379/© 2019 Elsevier Inc. All rights reserved.